DDoS attack on the website of the EU Parliament

B2B Cyber ​​Security ShortNews

Share post

The website of the EU Parliament was temporarily unavailable because it was paralyzed by a DDoS attack, according to Roberta Metsola, President of the European Parliament. A group close to the Kremlin is said to have claimed responsibility for the attack.

The website and all services were not available during the day on Wednesday, November 23.11rd. The press officer of the EU Parliament, Jaume Duch, announced via Twitter that “the site is not available due to a DDoS attack. Some services of the EU Parliament are currently disrupted by the targeted overload”. Late in the evening, Jaume Duch reported via Twitter that the DDOS attack had been contained and that the European Parliament website was fully accessible again. However, the EP services would continue to monitor the situation.

DDoS attack by Kremlin-affiliated group

Roberta Metsola, the President of the European Parliament, also made a notable tweet “@Europarl_EN
has fallen victim to a sophisticated cyber attack. A group close to the Kremlin has acknowledged this. Our IT experts defend themselves against this and protect our systems. And that's after we declared Russia a state that supports terrorism. My answer: #SlavaUkraini”.

Strong attack - but probably little damage

The IT structure of the EU Parliament website is apparently not as badly protected as many think. The page was not accessible for a long time due to the overload, but no major damage has apparently happened. At least the entire website was available again in the evening.

While DDoS attacks are technically an old type of attack, they remain effective. Netscout recently stated that there were over 2022 million DDoS attacks worldwide in the first half of 6. In EMEA, over 350.000 DNA amplification attacks were among the top 20 vector attacks. This tool is a boost attack for a DDoS attack.

More at Europarl.Europa.eu

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more